【判断题】
有关全国性的重大政策问题,只有党中央有权作出决定。
A. 对
B. 错
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【判断题】
党的全国代表大会每五年举行一次,由中央委员会召集。中央委员会认为有必要,或者有二分之一以上的省一级组织提出要求,全国代表大会可以提前举行。
A. 对
B. 错
【判断题】
党的中央纪律检查委员会由中央委员会全体会议选举。
A. 对
B. 错
【判断题】
党的地方各级委员会全体会议,每年至少召开一次。
A. 对
B. 错
【判断题】
中国共产党始终把为人类做出新的更大的贡献作为自己的使命。
A. 对
B. 错
【判断题】
26、作风问题的核心是党同人民群众的关系问题。
A. 对
B. 错
【判断题】
理想信念就是共产党人精神上的钙。
A. 对
B. 错
【判断题】
十九大报告指出,提拔重用牢固树立“四个意识”和“四个自信”、坚决维护党中央权威、全面贯彻执行党的理论和路线方针政策、忠诚干净担当的干部。
A. 对
B. 错
【判断题】
保持土地承包关系稳定并长久不变,第二轮土地承包到期后再延长二十年。
A. 对
B. 错
【判断题】
建设强大的现代化陆军、海军、空军、火箭军和战略支援部队,打造坚强高效的军种联合作战指挥机构。
A. 对
B. 错
【判断题】
党的组织建设是党的根本性建设,决定党的建设方向和效果。
A. 对
B. 错
【判断题】
全面准确贯彻“一国两制”方针,牢牢掌握宪法和基本法赋予的中央对香港、澳门全面管治权,深化内地和港澳台地区交流合作,保持香港、澳门繁荣稳定。
A. 对
B. 错
【判断题】
十九大报告指出,改革全面发力,多点突破,纵深推进,着力增强改革系统性、整体性、协同性,压茬拓展改革广度和深度,推出1500多项改革举措。
A. 对
B. 错
【判断题】
十九大报告指出,要倡导创新文化,强化知识产权创造、保护、运用。
A. 对
B. 错
【判断题】
国家安全是安邦定国的重要基石,维护国家安全是全国各族人民根本利益所在。
A. 对
B. 错
【判断题】
解决台湾问题、实现祖国完全统一,是全体中华儿女共同愿望,是中华民族根本利益所在。
A. 对
B. 错
【判断题】
增强党自我净化能力,根本靠强化党的自我监督和民主监督。
A. 对
B. 错
【判断题】
巩固和发展爱国统一战线。坚持长期共存、互相监督、肝胆相照、荣辱与共,支持民主党派按照中国特色社会主义参政党要求更好履行职能。
A. 对
B. 错
【判断题】
“一国两制”的最先提出是为了解决香港澳门问题对不对?
A. 对
B. 错
【判断题】
十九大报告强调,我们坚决维护国家主权和领土完整,绝不容忍国家分裂的历史悲剧重演。一切分裂祖国的活动都必将遭到全体中国人坚决反对。
A. 对
B. 错
【判断题】
不论是高级干部还是普通党员,要做合格党员,学习贯彻党章都是第一位要求。
A. 对
B. 错
【判断题】
我国是工人阶级领导的、以工农联盟为基础的人民民主专政的社会主义国家,国家一切权力属于人民。
A. 对
B. 错
【判断题】
依法治国是党领导人民治理国家的根本保证。
A. 对
B. 错
【判断题】
十九大报告指出,要建设知识型、技能型、学习型劳动者大军,弘扬劳模精神和工匠精神,营造劳动光荣的社会风尚和精益求精的敬业风气。
A. 对
B. 错
【判断题】
从十八大到二十大,是“两个一百年”奋斗目标的历史交汇期。
A. 对
B. 错
【判断题】
我国是工人阶级领导的,以工农联盟为基础的人民民主专政的社会主义国家,国家一切权利属于人民。
A. 对
B. 错
【判断题】
发展中国特色社会主义文化要坚守马克思主义立场。
A. 对
B. 错
【判断题】
发展中国特色社会主义文化要坚持为人民服务、为社会主义服务。
A. 对
B. 错
【判断题】
中国特色社会主义是精神文明和物质文明全面发展的社会主义。
A. 对
B. 错
【单选题】
Word2010插入题注时如需加入章节号,如“图1-1”,无需进行的操作是___
A. 将章节起始位置套用内置标题样式
B. 将章节起始位置应用多级符号
C. 将章节起始位置应用自动编号
D. 自定义题注样式为“图”
【单选题】
Word2010可自动生成参考文献书目列表,在添加参考文献的“源”主列表时,“源”不可能直接来自于___
A. 网络中各知名网站
B. 网上邻居的用户共享
C. 电脑中的其他文档
D. 自己录入
【单选题】
WORD文档的编辑限制包括:___
A. 格式设置限制
B. 编辑限制
C. 权限保护
D. 以上都是
【单选题】
Word中的手动换行符是通过___产生的
A. 插入分页符
B. 插入分节符
C. 键入ENTER
D. 按SHIFT+ENTER
【单选题】
关于Word2010的页码设置,以下表述错误的是___
A. 页码可以被插入到页眉页脚区域
B. 页码可以被插入到左右页边距
C. 如果希望首页和其他页页码不同必须设置“首页不同”
D. 可以自定义页码并添加到构建基块管理器中的页码库中
【单选题】
关于大纲级别和内置样式的对应关系,以下说法正确的是___
A. 如果文字套用内置样式“正文”,则一定在大纲视图中显示为“正文文本”
B. 如果文字在大纲视图中显示为“正文文本”,则一定对应样式为“正文”
C. 如果文字的大纲级别为1级,则被套用样式“标题1”
D. 以上说法都不正确
【单选题】
关于导航窗格,以下表述错误的是___
A. 能够浏览文档中的标题
B. 能够浏览文档中的各个页面
C. 能够浏览文档中的关键文字和词
D. 能够浏览文档中的脚注、尾注、题注等
【单选题】
关于样式、样式库和样式集,以下表述正确的是___
A. 快速样式库中显示的是用户最为常用的样式
B. 用户无法自行添加样式到快速样式库
C. 多个样式库组成了样式集
D. 样式集中的样式存储在模板中
【单选题】
如果WORD文档中有一段文字不允许别人修改,可以通过:___
A. 格式设置限制
B. 编辑限制
C. 设置文件修改密码
D. 以上都是
【单选题】
如果要将某个新建样式应用到文档中,以下哪种方法无法完成样式的应用___
A. 使用快速样式库或样式任务窗格直接应用
B. 使用查找与替换功能替换样式
C. 使用格式刷复制样式
D. 使用CTRL+W快捷键重复应用样式
【单选题】
若文档被分为多个节,并在“页面设置”的版式选项卡中将页眉和页脚设置为奇偶页不同,则以下关于页眉和页脚说法正确的是___
A. 文档中所有奇偶页的页眉必然都不相同
B. 文档中所有奇偶页的页眉可以都不相同
C. 每个节中奇数页页眉和偶数页页眉必然不相同
D. 每个节的奇数页页眉和偶数页页眉可以不相同
【单选题】
通过设置内置标题样式,以下哪个功能无法实现___
A. 自动生成题注编号
B. 自动生成脚注编号
C. 自动显示文档结构
D. 自动生成目录
推荐试题
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.